CN113904899A - Information security encryption method, system, equipment and medium - Google Patents

Information security encryption method, system, equipment and medium Download PDF

Info

Publication number
CN113904899A
CN113904899A CN202111167423.9A CN202111167423A CN113904899A CN 113904899 A CN113904899 A CN 113904899A CN 202111167423 A CN202111167423 A CN 202111167423A CN 113904899 A CN113904899 A CN 113904899A
Authority
CN
China
Prior art keywords
frequency
signal
mapping
frequency band
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111167423.9A
Other languages
Chinese (zh)
Other versions
CN113904899B (en
Inventor
黄哲彬
刘春早
江常达
蔡凤福
林命鑫
方雅萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gongcheng Management Consulting Co ltd
Original Assignee
Gongcheng Management Consulting Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gongcheng Management Consulting Co ltd filed Critical Gongcheng Management Consulting Co ltd
Priority to CN202111167423.9A priority Critical patent/CN113904899B/en
Publication of CN113904899A publication Critical patent/CN113904899A/en
Application granted granted Critical
Publication of CN113904899B publication Critical patent/CN113904899B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/69Spread spectrum techniques
    • H04B1/713Spread spectrum techniques using frequency hopping
    • H04B1/7136Arrangements for generation of hop frequencies, e.g. using a bank of frequency sources, using continuous tuning or using a transform
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/69Spread spectrum techniques
    • H04B1/713Spread spectrum techniques using frequency hopping
    • H04B1/715Interference-related aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/06Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
    • H04B7/0613Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission
    • H04B7/0615Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal
    • H04B7/0617Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station using simultaneous transmission of weighted versions of same signal for beam forming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/08Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
    • H04B7/0837Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station using pre-detection combining
    • H04B7/0842Weighted combining
    • H04B7/086Weighted combining using weights depending on external parameters, e.g. direction of arrival [DOA], predetermined weights or beamforming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03006Arrangements for removing intersymbol interference
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention provides an information security encryption method, system, device and medium, and relates to the technical field of 5G encryption communication. Includes receiving a baseband signal from a base station; modulating and mapping the baseband signals to obtain a plurality of mapping layers; carrying out antenna port mapping and resource element mapping on a plurality of mapping layers to obtain a message, dividing the message into a plurality of message segments with different lengths, weighting and reordering each message segment to form a new data stream, carrying out signal enhancement on a local area through beam forming, and combining the data streams subjected to orthogonal frequency division multiplexing into frequency band signals with preset frequency; performing power amplification on the frequency band signal and transmitting the frequency band signal to a frequency hopping system to generate a transmission signal; the transmission signal reaches the user terminal through the physical antenna. The method can effectively enhance the safety and reliability of data information.

Description

Information security encryption method, system, equipment and medium
Technical Field
The invention relates to the technical field of 5G encryption communication, in particular to an information security encryption method, system, equipment and medium.
Background
With the continuous development of information technology, network communication faces more and more threats. Particularly, security problems such as eavesdropping or interception of 5G communication become more and more prominent after electronic devices are interconnected with each other.
The 5G network is used as a fifth generation mobile communication network, and the peak value theoretical transmission speed of the 5G network can reach 1GB every 8 seconds, which is hundreds of times faster than that of the 4G network. Compared with the prior mobile communication technology, the 5G has the characteristics of super-large bandwidth, super-high speed, super-low time delay, super-multiple connection and the like; this makes 5G communication become the current and future main communication standard, so that 5G network is very important in security, and a method for encrypting information security is urgently needed.
Disclosure of Invention
The invention aims to provide an information security encryption method which can effectively enhance the security of data information.
The embodiment of the invention is realized by the following steps:
in a first aspect, an embodiment of the present application provides an information security encryption method, which receives a baseband signal from a base station; modulating and mapping the baseband signals to obtain a plurality of mapping layers; performing antenna port mapping and resource element mapping on the plurality of mapping layers to obtain a message; dividing the message into a plurality of message segments with different lengths; weighting and reordering each segment to form a new data stream; performing signal enhancement on a local area through beamforming; processing data streams through orthogonal frequency division multiplexing and combining the data streams into frequency band signals with preset frequency; performing power amplification on the frequency band signal and transmitting the frequency band signal to a frequency hopping system to generate a transmission signal; the transmission signal reaches the user terminal through the physical antenna.
In some embodiments of the present invention, the frequency band signal is power-amplified and transmitted to the frequency hopping system to generate a transmission signal; the step of transmitting signal to user end via physical antenna includes; the frequency band signal is power amplified, the first frequency synthesizer in the frequency hopping system changes frequency continuously according to the pseudo random code, the transmission signal is transmitted to the user terminal, and the second frequency synthesizer of the user terminal keeps the same change rule with the first frequency synthesizer for analyzing the transmission signal.
In some embodiments of the invention, the step of reordering comprises: and reordering the data in the obtained message in a matrix form.
In some embodiments of the present invention, the step of processing the data stream by orthogonal frequency division multiplexing and combining the data stream into the frequency band signal with the preset frequency includes: and processing the data streams through orthogonal frequency division multiplexing and combining the data streams into frequency band signals with different preset frequencies.
In some embodiments of the present invention, the baseband signal is a digital baseband signal in binary form obtained by converting an analog signal into a digital signal in the base station.
In some embodiments of the present invention, the segment is encoded using a two-level system.
In some embodiments of the present invention, the first frequency synthesizer and the second frequency synthesizer both employ direct digital frequency synthesizers.
In a second aspect, an embodiment of the present application provides an information security encryption system, including a receiving module, configured to receive a baseband signal from a base station; modulating and mapping the baseband signals to obtain a plurality of mapping layers; the processing module is used for carrying out antenna port mapping and resource element mapping on the plurality of mapping layers to obtain a message; dividing the message into a plurality of message segments with different lengths; weighting and reordering each segment to form a new data stream; the beam forming module is used for strengthening signals of the local area through beam forming; the orthogonal frequency division multiplexing module is used for processing data streams through orthogonal frequency division multiplexing and combining the data streams into frequency band signals with preset frequency; the transmitting module is used for amplifying the power of the frequency band signal and transmitting the frequency band signal to the frequency hopping system to generate a transmission signal; the transmission signal reaches the user terminal through the physical antenna.
In a third aspect, an embodiment of the present application provides an electronic device, which includes at least one processor, at least one memory, and a data bus; wherein: the processor and the memory complete mutual communication through a data bus; the memory stores program instructions executable by the processor, which invokes the program instructions to perform a method for secure encryption of information.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium on which a computer program is stored, where the computer program, when executed by a processor, implements an information security encryption method.
Compared with the prior art, the embodiment of the invention has at least the following advantages or beneficial effects:
an information security encryption method, which is a technology for protecting electronic information in the transmission process and in a storage body to prevent leakage by using a mathematical means for most of information encryption in the prior art. The method still exists to be cracked by corresponding mathematical means, so that the safety signal processing is carried out based on physical means, and the principle of the method is that two technologies, namely a beam forming technology and an interference signal technology, are fused in a data transmitting stage so as to effectively enhance the safety of data information.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
FIG. 1 is a flow chart of a method for encrypting information securely according to the present invention;
FIG. 2 is a flow chart of an information security encryption system according to the present invention;
fig. 3 is a schematic structural diagram of an electronic device according to the present invention.
Icon: 1. a receiving module; 2. a processing module; 3. a beam forming module; 4. an orthogonal frequency division multiplexing module; 5. a transmitting module; 6. a processor; 7. a memory; 8. a data bus.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
In the description of the present application, it should be noted that the terms "upper", "lower", "inner", and the like refer to the orientation or positional relationship shown in the drawings, or the orientation or positional relationship which the product of the application is usually placed in when used, and are used only for convenience of description and simplification of the description, but do not indicate or imply that the device or element referred to must have a specific orientation, be constructed in a specific orientation, and be operated, and thus, should not be construed as limiting the present application.
In the description of the present application, it is also to be noted that, unless otherwise explicitly specified or limited, the term "connected" is to be interpreted broadly, e.g. as a fixed connection, a detachable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the individual features of the embodiments can be combined with one another without conflict.
Example 1
Referring to fig. 1, a method for encrypting information securely according to an embodiment of the present application is provided, in view of the fact that most of the information encryption in the prior art uses mathematical means to protect electronic information during transmission and in the storage to prevent leakage. The method still exists to be cracked by corresponding mathematical means, so that the safety signal processing is carried out based on physical means, and the principle of the method is that two technologies, namely a beam forming technology and an interference signal technology, are fused in a data transmitting stage so as to effectively enhance the safety of data information. The specific implementation mode is as follows:
s101: receiving a baseband signal from a base station; modulating and mapping the baseband signals to obtain a plurality of mapping layers;
s102: performing antenna port mapping and resource element mapping on the plurality of mapping layers to obtain a message;
the method comprises the steps of processing an original baseband signal of a base station, wherein the steps of modulation mapping, antenna port mapping, resource element mapping and the like belong to the known technology and aim to carry out digital processing on the original baseband signal.
S103: dividing the message into a plurality of message segments with different lengths;
for the generation of the message, the message content is disordered according to a preset mode, so that the message is firstly divided into a plurality of message segments, and meanwhile, the message and the message segments adopt a two-level system coding. For example: the message is "101100110101010000100101", and it is assumed that every eight characters are a segment, and the generated segments are "10110", "0111010101", and "0000100101".
S104: weighting and reordering each segment to form a new data stream;
for the segmented segments, a reverse arrangement or a penetration arrangement mode can be adopted, the reverse arrangement is taken as an example, and the message after weighting and reordering is '0000100101011101010110110'. Therefore, in the process of transmitting the message, the specific content of the data can be obtained only by presetting the rule corresponding to the designer during analysis, and the safety of data transmission is improved.
S105: performing signal enhancement on a local area through beamforming;
signal processing using beamforming techniques to direct transmit and receive signals to a certain direction or region and using an array of sensors. By adjusting the parameters of the basic cells of the phased array, constructive interference is obtained for signals at certain angles, while destructive interference is obtained for signals at other angles. Thereby enhancing the transmitted signal.
S106: processing data streams through orthogonal frequency division multiplexing and combining the data streams into frequency band signals with preset frequency;
the method adopts an orthogonal frequency division multiplexing technology, and aims to divide a channel into a plurality of orthogonal sub-channels, convert a high-speed data signal into parallel low-speed sub-data streams and modulate the parallel low-speed sub-data streams to each sub-channel for transmission. The orthogonal signals can be separated by using correlation techniques at the receiving end, which can reduce mutual interference between the sub-channels. The signal bandwidth on each subchannel is less than the associated bandwidth of the channel, and therefore can be viewed as flat fading on each subchannel, so that intersymbol interference can be eliminated. And since the bandwidth of each sub-channel is only a small fraction of the original channel bandwidth, channel equalization becomes relatively easy. The anti-interference performance is improved.
S107: performing power amplification on the frequency band signal and transmitting the frequency band signal to a frequency hopping system to generate a transmission signal; the transmission signal reaches the user terminal through the physical antenna.
The frequency band signals are subjected to power amplification, the transmission distance is increased, and in addition, the anti-interference performance is further improved by adopting a frequency hopping system.
In some embodiments of the present invention, the frequency band signal is power-amplified and transmitted to the frequency hopping system to generate a transmission signal; the step of transmitting signal to user end via physical antenna includes; the frequency band signal is power amplified, the first frequency synthesizer in the frequency hopping system changes frequency continuously according to the pseudo random code, the transmission signal is transmitted to the user terminal, and the second frequency synthesizer of the user terminal keeps the same change rule with the first frequency synthesizer for analyzing the transmission signal.
In some embodiments of the invention, the use of a first frequency synthesizer and a second frequency synthesizer to avoid interception changes the frequency by a pseudo-random code (PN code) so that the changes can be varied in real time, frequency hopping communications are more covert than fixed frequency communications and are also difficult to intercept. As long as the opposite side does not know the carrier frequency hopping rule, the communication content of the opposite side is difficult to intercept, thereby improving the safety.
In some embodiments of the present invention, the data in the obtained message is reordered in the form of a matrix.
In some embodiments of the present invention, the purpose of using a matrix for the data flow of the message is to optimize the function in the matrix, so that the message has higher compatibility when being processed and stored.
In some embodiments of the present invention, the step of processing the data stream by orthogonal frequency division multiplexing and combining the data stream into the frequency band signal with the preset frequency includes: and processing the data streams through orthogonal frequency division multiplexing and combining the data streams into frequency band signals with different preset frequencies.
In some embodiments of the present invention, the frequency band signals are transmitted at different frequencies, so that mutual influence of the frequency band signals of the same frequency can be avoided, thereby improving the accuracy of transmission.
In some embodiments of the present invention, the baseband signal is a digital baseband signal in binary form obtained by converting an analog signal into a digital signal in the base station. The segment is encoded in two-level system.
In some embodiments of the present invention, the digital baseband signal and the message segment adopt binary systems, so that the operation rule is simple and the hardware processing speed is high; and only two numbers of 0 and 1 are used in the binary system, errors are not easy to occur in transmission and processing, and therefore the high reliability of the computer can be guaranteed.
In some embodiments of the present invention, the first frequency synthesizer and the second frequency synthesizer both employ direct digital frequency synthesizers.
In some embodiments of the present invention, a direct digital frequency synthesizer is a new frequency synthesis technique that directly synthesizes a desired waveform from the concept of phase. Compared with the traditional frequency synthesizer, the direct digital frequency synthesizer has the advantages of low cost, low power consumption, high resolution, fast conversion time and the like.
Example 2
Referring to fig. 2, an information security encryption system provided by the present invention includes:
a receiving module 1, configured to receive a baseband signal from a base station; modulating and mapping the baseband signals to obtain a plurality of mapping layers;
the processing module 2 is used for performing antenna port mapping and resource element mapping on the plurality of mapping layers to obtain a message; dividing the message into a plurality of message segments with different lengths; weighting and reordering each segment to form a new data stream;
the beam forming module 3 is used for performing signal enhancement on a local area through beam forming;
an orthogonal frequency division multiplexing module 4, configured to process data streams through orthogonal frequency division multiplexing and combine the data streams into a frequency band signal with a preset frequency;
the transmitting module 5 is used for performing power amplification transmission on the frequency band signal to a frequency hopping system to generate a transmission signal; the transmission signal reaches the user terminal through the physical antenna.
Example 3
Referring to fig. 3, an electronic device according to the present invention includes at least one processor 6, at least one memory 7, and a data bus 8; wherein: the processor 6 and the memory 7 complete mutual communication through a data bus 8; the memory 7 stores program instructions executable by the processor 6, and the processor 6 calls the program instructions to perform an information security encryption method. For example, the following steps are realized:
receiving a baseband signal from a base station; modulating and mapping the baseband signals to obtain a plurality of mapping layers; carrying out antenna port mapping, resource element mapping and beam forming on the plurality of mapping layers to obtain a message; dividing the message into a plurality of message segments; weighting and reordering each segment and generating a data stream; merging the data streams processed by the orthogonal frequency division multiplexing into frequency band signals of preset frequency; performing power amplification on the frequency band signal and transmitting the frequency band signal to a frequency hopping system to generate a transmission signal; the transmission signal reaches the user terminal through the physical antenna.
The MEMORY 7 may be, but is not limited to, RANDOM ACCESS MEMORY (RAM), READ ONLY MEMORY (READ ONLY MEMORY, ROM), PROGRAMMABLE READ ONLY MEMORY (PROM), ERASABLE READ ONLY MEMORY (EPROM), electrically ERASABLE READ ONLY MEMORY (EEPROM), and the like.
The processor 6 may be an integrated circuit chip having signal processing capabilities. The PROCESSOR 6 may be a general-purpose PROCESSOR, including a CENTRAL PROCESSING UNIT (CPU), a NETWORK PROCESSOR (NP), etc.; it may also be a digital signal processor (DIGITAL SIGNAL PROCESSING, DSP), an APPLICATION Specific Integrated CIRCUIT (ASIC), a FIELD PROGRAMMABLE gate array (FIELD-PROGRAMMABLE GATE ARRAY, FPGA) or other PROGRAMMABLE logic device, discrete gate or transistor logic device, discrete hardware component.
Example 4
In some embodiments of the invention, a computer-readable storage medium has stored thereon a computer program which, when executed by a processor 6, implements an information security encryption method. For example, the following steps are realized:
receiving a baseband signal from a base station; modulating and mapping the baseband signals to obtain a plurality of mapping layers; carrying out antenna port mapping, resource element mapping and beam forming on the plurality of mapping layers to obtain a message; dividing the message into a plurality of message segments; weighting and reordering each segment and generating a data stream; merging the data streams processed by the orthogonal frequency division multiplexing into frequency band signals of preset frequency; performing power amplification on the frequency band signal and transmitting the frequency band signal to a frequency hopping system to generate a transmission signal; the transmission signal reaches the user terminal through the physical antenna.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The above-described functions, if implemented in the form of software functional modules and sold or used as a separate product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the above-described method according to the embodiments of the present application. And the aforementioned storage medium includes: a U disk, a removable hard disk, a READ-ONLY MEMORY (ROM), a RANDOM ACCESS MEMORY (RAM), a magnetic disk or an optical disk, and various media capable of storing program codes.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (10)

1. An information security encryption method, comprising:
receiving a baseband signal from a base station; modulating and mapping the baseband signals to obtain a plurality of mapping layers;
performing antenna port mapping and resource element mapping on the plurality of mapping layers to obtain a message;
dividing the message into a plurality of message segments with different lengths;
weighting and reordering each segment to form a new data stream;
performing signal enhancement on a local area through beamforming;
processing the data stream through orthogonal frequency division multiplexing and combining the data stream into a frequency band signal with a preset frequency;
performing power amplification on the frequency band signal and transmitting the frequency band signal to a frequency hopping system to generate a transmission signal; the transmission signal reaches the user terminal through the physical antenna.
2. The information security encryption method of claim 1, wherein the frequency band signal is power amplified and transmitted to a frequency hopping system to generate a transmission signal; the step of transmitting the transmission signal to the user terminal through the physical antenna comprises the following steps; and performing power amplification on the frequency band signal, continuously changing the frequency by a first frequency synthesizer in the frequency hopping system according to the pseudo-random code, transmitting the transmission signal to the user terminal, and simultaneously keeping the change rule of a second frequency synthesizer of the user terminal consistent with the change rule of the first frequency synthesizer so as to analyze the transmission signal.
3. A method of information security encryption as claimed in claim 1, wherein said step of reordering comprises: and reordering the data in the obtained message in a matrix form.
4. The method as claimed in claim 1, wherein the step of processing the data stream by orthogonal frequency division multiplexing and combining the data stream into a frequency band signal of a predetermined frequency comprises: and processing the data streams through orthogonal frequency division multiplexing and combining the data streams into frequency band signals with different preset frequencies.
5. A method for encrypting information security according to claim 1, wherein the baseband signal is a digital baseband signal in binary form obtained by converting an analog signal into a digital signal in a base station.
6. The method of claim 1, wherein the segment is encoded using a two-level system.
7. A method of encrypting information security as claimed in claim 2, wherein said first frequency synthesizer and said second frequency synthesizer each employ a direct digital frequency synthesizer.
8. An information security encryption system, comprising:
a receiving module for receiving a baseband signal from a base station; modulating and mapping the baseband signals to obtain a plurality of mapping layers;
the processing module is used for carrying out antenna port mapping and resource element mapping on the mapping layers to obtain a message; dividing the message into a plurality of message segments with different lengths; weighting and reordering each segment to form a new data stream;
the beam forming module is used for strengthening signals of the local area through beam forming;
the orthogonal frequency division multiplexing module is used for processing the data stream through orthogonal frequency division multiplexing and combining the data stream into a frequency band signal with preset frequency;
the transmitting module is used for amplifying the power of the frequency band signal and transmitting the frequency band signal to a frequency hopping system to generate a transmission signal; the transmission signal reaches the user terminal through the physical antenna.
9. An electronic device comprising at least one processor, at least one memory, and a data bus; wherein: the processor and the memory complete mutual communication through the data bus; the memory stores program instructions executable by the processor, the processor calling the program instructions to perform the method of any of claims 1-7.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-7.
CN202111167423.9A 2021-10-07 2021-10-07 Information security encryption method, system, equipment and medium Active CN113904899B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111167423.9A CN113904899B (en) 2021-10-07 2021-10-07 Information security encryption method, system, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111167423.9A CN113904899B (en) 2021-10-07 2021-10-07 Information security encryption method, system, equipment and medium

Publications (2)

Publication Number Publication Date
CN113904899A true CN113904899A (en) 2022-01-07
CN113904899B CN113904899B (en) 2023-12-22

Family

ID=79190187

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111167423.9A Active CN113904899B (en) 2021-10-07 2021-10-07 Information security encryption method, system, equipment and medium

Country Status (1)

Country Link
CN (1) CN113904899B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040103005A (en) * 2003-05-30 2004-12-08 이용환 Resource Allocating Method for OFDM-based Radio Communication System, Transmission Signal Generating Method and Transmitter Using the Same
CN1740815A (en) * 2005-09-22 2006-03-01 西安电子科技大学 Coding frequency-hopping high-resolution ratio range finding and velocity measuring method and radar
CN1853361A (en) * 2003-07-08 2006-10-25 弗拉里奥恩技术公司 Methods for generating and transmitting frequency hopped signals
CN101374006A (en) * 2007-08-23 2009-02-25 中兴通讯股份有限公司 Multiplexing transmission method and system for multi-input multi-output OFDM system closed-loop space
CN101431357A (en) * 2007-11-08 2009-05-13 大唐移动通信设备有限公司 Data transmission method and apparatus
CN101611605A (en) * 2007-01-17 2009-12-23 高通股份有限公司 The hopping structure that is used for control channel
CN101964694A (en) * 2010-09-27 2011-02-02 北京航空航天大学 System and method for transmitting low interception signal of high-throughput and delay sensibility wireless network
CN102857254A (en) * 2012-09-21 2013-01-02 中国航空无线电电子研究所 Frequency hopping communication system and base band achieving method thereof
CN107786244A (en) * 2016-08-31 2018-03-09 北京华为数字技术有限公司 Transmit the method and its equipment of information
CN111585612A (en) * 2020-03-25 2020-08-25 北京理工大学 Radio frequency front end of coherent fast frequency hopping system and communication method

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040103005A (en) * 2003-05-30 2004-12-08 이용환 Resource Allocating Method for OFDM-based Radio Communication System, Transmission Signal Generating Method and Transmitter Using the Same
CN1853361A (en) * 2003-07-08 2006-10-25 弗拉里奥恩技术公司 Methods for generating and transmitting frequency hopped signals
CN1740815A (en) * 2005-09-22 2006-03-01 西安电子科技大学 Coding frequency-hopping high-resolution ratio range finding and velocity measuring method and radar
CN101611605A (en) * 2007-01-17 2009-12-23 高通股份有限公司 The hopping structure that is used for control channel
CN101374006A (en) * 2007-08-23 2009-02-25 中兴通讯股份有限公司 Multiplexing transmission method and system for multi-input multi-output OFDM system closed-loop space
CN101431357A (en) * 2007-11-08 2009-05-13 大唐移动通信设备有限公司 Data transmission method and apparatus
CN101964694A (en) * 2010-09-27 2011-02-02 北京航空航天大学 System and method for transmitting low interception signal of high-throughput and delay sensibility wireless network
CN102857254A (en) * 2012-09-21 2013-01-02 中国航空无线电电子研究所 Frequency hopping communication system and base band achieving method thereof
CN107786244A (en) * 2016-08-31 2018-03-09 北京华为数字技术有限公司 Transmit the method and its equipment of information
CN111585612A (en) * 2020-03-25 2020-08-25 北京理工大学 Radio frequency front end of coherent fast frequency hopping system and communication method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘瑞明;苟廷伟;王于;赵丽;: "关于一种数字跳频通信系统设计与实现", 楚雄师范学院学报, no. 12, pages 52 - 55 *

Also Published As

Publication number Publication date
CN113904899B (en) 2023-12-22

Similar Documents

Publication Publication Date Title
Bazzi et al. On integrated sensing and communication waveforms with tunable PAPR
US9780986B2 (en) System and method for low peak to average power ratio multiple access communications
EP3155780B1 (en) Ofdm based orbital angular momentum system and method
CN101510799B (en) Wireless communication device and wireless communication method
KR20180097903A (en) Apparatus and method for generating secure key in wireless communication system
Ruotsalainen et al. Towards wireless secret key agreement with LoRa physical layer
Shawqi et al. A review of PAPR reduction techniques for UFMC waveform
Huang et al. Index modulation for OFDM RadCom systems
Roth et al. Localization attack by precoder feedback overhearing in 5G networks and countermeasures
Liu et al. A novel chaos-based physical layer security transmission scheme for Internet of Things
Nooraiepour et al. Time-varying metamaterial-enabled directional modulation schemes for physical layer security in wireless communication links
Hajek et al. Capacity and reliability function for small peak signal constraints
CN113904899B (en) Information security encryption method, system, equipment and medium
Wei et al. On the polar code for the 60-GHz millimeter-wave systems
JP2018137702A (en) Radio transmission method
Au et al. A joint code-frequency index modulation for low-complexity, high spectral and energy efficiency communications
Ansari et al. Analyzing physical layer security of antenna subset modulation as block encryption ciphers
Ding et al. Can frequency diverse array prevent wireless eavesdropping in range domain?
Jovic Class of novel broadband chaos‐based coherent communication systems
Ansari et al. Inter-subset hamming distance maximization for enhancing the physical layer security of antenna subset modulation
Alaca et al. Secure Uplink IM-OFDMA with Artificial IQ Imbalance
El-Sallabi et al. Characterization of secrecy capacity of time reversal technique for wireless physical layer security
Sadek et al. Research on interference of conventional communication signals
Chandini et al. PAPR Reduction in SDR-Based OFDM System
Zarrouk et al. Investigation of radio channel model in indoor environment at 60 GHz

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant